Distributed anomaly detection algorithm based on joint classifier

被引:0
作者
Zhao, Yang [1 ]
Liu, Jiqiang [1 ]
机构
[1] School of Computer and Information Technology, Beijing Jiaotong University, Beijing
来源
Journal of Computational Information Systems | 2015年 / 11卷 / 14期
关键词
Cloud Computing Attack; Fuzzy K-means; IDS;
D O I
10.12733/jcis14087
中图分类号
学科分类号
摘要
Cloud computing resources access modes as well as its collaborative computing characteristics are conducive to intrusion, and it makes cloud computing security issues more worrying, especially in largescale cloud computing environment. In contrast to previous methods, our approach introduces a cloud computing intrusion detection system based on joint classifier, and makes improvement to the security of cloud computing platform. There are three main aspects. 1) Traffic flow monitoring method, 2) Flow feature selection technique, 3) Joint classification algorithm. Furthermore, our approach has two important features. First, we use feature selection technique to find out all possible combinations of the attributes from the data set, and pick out a set of attributes with the best prediction accuracy. Second, this multi-level intrusion detection method combines with K-means and Bayesian Belief Network, and it can comprehensive cascade defects of single algorithm, and make all the indicators of results more balance, to achieve an ideal result generally. According to our evaluation result, our approach can improve the detection efficiency and real-time monitor in cloud computing platform. And our multi-level algorithm is better than the single K-means and Bayesian Belief algorithm, especially in the precision rate and the overall accuracy. ©, 2015, Journal of Computational Information Systems. All right reserved.
引用
收藏
页码:4951 / 4963
页数:12
相关论文
共 22 条
[11]  
Okamura K., Oyama Y., Load-based covert channels between Xen virtual machines, Proceedings of the 2010 ACM Symposium on Applied Computing, (2010)
[12]  
Vieira K., Schulter A., Westphall B.C., Intrusion detection for grid and cloud computing, It Professional, 12, pp. 38-43, (2010)
[13]  
Bijani S., Robertson D., Aspinall D., Probing attacks on multi-agent systems using electronic institutions, Declarative Agent Languages and Technologies IX, pp. 35-50, (2012)
[14]  
Bhadauria R.R., Chaki R., Chaki N., A survey on security issues in cloud computing, 5388, (2011)
[15]  
Subashini S.S., Kavitha V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, pp. 1-11, (2011)
[16]  
Gupta S., Kumar P., Abraham A., A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment, International Journal of Distributed Sensor Networks, (2013)
[17]  
Lonea A.M., Popescu D.E., Tianfield H., Detecting DDoS Attacks in Cloud Computing Environment, International Journal of Computers Communications, 8, pp. 70-78, (2013)
[18]  
Chonka A., Xiang Y., Zhou W.L., Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks, Journal of Network and Computer Applications, 34, pp. 1097-1107, (2011)
[19]  
Lombardi F., Pietro R.D., Secure virtualization for cloud computing, Journal of Network and Computer Applications, 34, pp. 1113-1122, (2011)
[20]  
Lee J., Park M., Eom J., Multi-level intrusion detection system and log management in cloud computing, (2011)